語系:
http://www.nessus.org/u?97079438
https://www.securityfocus.com/archive/1/524191/30/0/threaded
https://www.securityfocus.com/archive/1/524192/30/0/threaded
https://www.securityfocus.com/archive/1/524193/30/0/threaded
https://www.securityfocus.com/archive/1/524876/30/0/threaded
https://www.securityfocus.com/archive/1/524877/30/0/threaded
https://www.securityfocus.com/archive/1/524878/30/0/threaded
https://www.securityfocus.com/archive/1/524879/30/0/threaded
嚴重性: High
ID: 62010
檔案名稱: symantec_messaging_gateway_sym12-013.nasl
版本: 1.21
類型: remote
系列: CGI abuses
已發布: 2012/9/7
已更新: 2021/1/19
支援的感應器: Nessus
風險因素: High
分數: 7.4
風險因素: High
基本分數: 7.9
時間分數: 6.5
媒介: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2012-3579
CPE: cpe:/a:symantec:messaging_gateway
必要的 KB 項目: www/sym_msg_gateway
可被惡意程式利用: true
可輕鬆利用: No exploit is required
修補程式發佈日期: 2012/8/27
弱點發布日期: 2012/8/27
Core Impact
Metasploit (Symantec Messaging Gateway 9.5 Default SSH Password Vulnerability)
Elliot (Symantec Messaging Gateway 9.5.3 File Disclosure)
CVE: CVE-2012-0307, CVE-2012-0308, CVE-2012-3579, CVE-2012-3580, CVE-2012-3581, CVE-2012-4347